The system must provide security and control access to those functions based on permissions.
系统必须提供安全性,并根据相应的权限控制对这些功能的访问。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
Unlike customization, which we will discuss in a minute, security is based on policies created by system administrators to enforce corporate and departmental defined access controls.
与自定义不同,我们将立即讨论安全性。安全性是由系统管理员创建的,用于执行企业或部门定义的访问控制。
It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.
务必考虑系统的每个层次的可能访问路径,同时还要考虑授权如何与其他安全功能(如网络级别的保护)集成。
The V8 security system can then fetch the security callback of the object being accessed and call it to ask if another context is allowed to access it.
V8的安全系统可以获取被访问对象的安全回调函数,并且调用它来判断是否允许另外一个context去访问它。
You can do so by limiting access to the commands that can affect them, and also through command resource security. Here are some considerations for SYSTEM resources.
为此,可以限制对可能会影响它们的命令的访问,或者,也可以通过命令资源安全性提供保护。
Too little security, and your only defense system will be thwarted and allow full access to everything inside that checkpoint.
如果安全措施太少,您唯一的防御系统将会失效,从而让外人能够访问检查点之后的所有数据。
Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.
同样,如果系统被侵入并受到破坏,那么将数据库或数据库访问信息存储在正在运行Web服务器的机器上会引发安全性问题。
By using access control matrix, we can achieve the real time and dynamic control of task, which ensures the system security.
通过引入访问控制矩阵,实现了对任务的实时、动态的控制,从而确保了系统的安全。
Then, this paper deeply investigated the three difficult problems of the system, such as exception handling, security right controlling and heterogeneous database access.
然后,就系统的三个难点问题——异常处理、安全权限控制和异构数据库访问进行了深入的研究。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
NET has constructed the school information management system, introduced the system overall design. The database access method and the data security guard measure.
NET构建了学校信息管理系统,本文介绍了系统的整体设计,数据库访问方法和数据安全防范措施。
A database security access proxy system can solve these problems and it is easy to join it into information system without increasing any complication in system.
采用数据库安全访问代理系统可以解决上述安全问题并且很容易加入到信息系统中而不增加系统的复杂性。
Integration of rural credit cooperatives' credit management system, the generic data access interface and security control implementation of the three-tier framework are analysed and researched.
结合农村信用社信贷管理系统,对三层构架中的通用数据访问接口和安全控制实现进行了分析研究。
The architecture of access control model is independent of the implementation, which makes the system be able to adapt to various security requirements and dynamic changes.
该系统的访问控制框架的结构与具体实现方法无关,能够满足群应用的不同安全要求以及动态群对安全性要求的变化。
The structure of the system, mail service protocols, mode of messaging, allocation of mailboxes as well as personal security for authentication and access control measures are discussed in this paper.
文中论述了该系统的结构、邮递服务协议、邮递方式、信箱的管理及信件的保密和存取控制手段等问题。
The system meets the demands of uniform authorization and access control, possessing the merits of good security, high flexible and easy to management.
该系统满足了统一授权和访问控制的需求,具有安全性好、灵活性高、便于管理等特点。
The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.
操作系统的安全是信息系统安全的基石,访问控制则是操作系统安全机制的重要内容。
It made information system, from access system to operate database and sign badge, all these things under security control.
使该所信息系统从用户访问系统,到操作数据库与具体实现签章等工作,都处在系统安全控制之下。
The thesis also analyses the design plan of system database, including its security, transaction management and ADO data access technology.
然后,论文论述了系统数据库的设计过程,其中包括安全性设计、事务管理的设计以及ADO数据访问技术的分析及运用。
Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.
与设置用户存取权限控制、冗余备份恢复、网络安全等多种安全策略共同建立有机的安全体系。
Disabling code access security makes the system vulnerable to attacks by malicious code such as viruses and worms.
禁用代码访问安全性会使系统容易受到恶意代码(如病毒和蠕虫)的攻击。
The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.
主要介绍网络安全准入控制系统组成及相关技术,并对该技术在铁路信息系统中如何应用加以探讨。
This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.
本文介绍了多用户信息系统中数据库的安全性控制的基本概念及控制模型,以及在多用户信息系统中安全性控制的实现方法。
There are two aspects included in database system security, which is access control security strategy and communication channel security.
数据库系统的安全性主要包括两个方面:访问控制策略和传输通道安全。
This paper provides two corresponding solutions: one is role-based access control, the other is effective security management to network system, network data and network users.
另一方面是对网络系统实施有效的安全管理,做好网络数据的备份和网络用户的管理两项工作。
At load time, the code access security system examines all policy levels and the resulting permission grant is the intersection of all allowed permissions in each level.
在载入时间,程序码存取安全系统会检查所有原则层级,产生的使用权限授权是每一个层级中所有允许的使用权限的交集。
The Role determines security and access a user who has this Role will have in the System.
角色决定安全性,以及含有该角色的用户所具有的系统访问权限。
Recent years, authentication based on the digital certificate and role-based access controls have features of safe and flexibility that enhance system security very prospect.
近几年产生的基于数字证书的认证和基于角色的访问控制具有安全性高、管理灵活的特征,对于加强系统的安全性很有应用前景。
Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.
为实现信息系统的安全目标,需要系统能够提供相关的安全服务:身份标识与认证服务、授权与访问控制服务、非否认服务、机密性服务、完整性服务。
应用推荐